Businesses with customers in California or the European Union must shore up their data collection practices or face significant fines.
Data and information security
An uptick in adoption of facial-recognition systems in retail, banking, travel, and other sectors calls on CPAs and other business leaders to assess the benefits of the technology against the risks.
Today’s tax firms must be vigilant against cyberthreats.
A not-for-profit organization called the Privacy Rights Clearinghouse has been collecting and reporting personal data breaches since 2005.
Protecting your firm from privacy breaches is often a matter of strong internal practices.
CPAs possess clients’ most sensitive personal and financial details, so it’s no surprise they’ve become prime hacking targets. Dustin Hall, a cybersecurity expert and director of CPACharge, recommends the following security tips to CPAs.
Your credentials might already be for sale on the dark web without your knowledge. Fortunately, there are steps you can take to monitor the dark web and shore up your cybersecurity defenses.
David Cieslak, CPA/CITP, CGMA, executive vice president and chief cloud officer, RKL eSolutions, explains how quantum computing will create vector-based cryptography, a system even hackers can’t penetrate.
An examination of Maryland’s records of accounting firm data breaches reveals what is known about these illicit activities and how to protect your firm.
A new breach affecting services used by CPA firms was confirmed when cloud services provider Cetrom said it suffered a malware attack that was discovered May 24.
Have you ever had a stranger ask to borrow your mobile phone? Do you connect to public Wi-Fi networks? Cybersecurity expert Mike Foster has advice for handling those situations.
Cybersecurity is a multifaceted, ever-changing concern of organizations. Cyber expert Mike Foster offers advice for keeping their networks secure.
Following a malware attack, cloud tax and accounting services provider Wolters Kluwer took a number of its platforms and applications offline this week.
As far as the Chrome app goes, the use of separate processes is intended to help make the product more stable. However, the search tools and internet provider you use are different matters.
Learn more about how concepts related to reconnaissance, simulation, and digital identity can improve cyber defenses.
Rob Goldberg, a principal at Deloitte, offers advice on why companies should hire an ethical hacker and how such a hacker can bolster cybersecurity.
Working outside the office can leave you open to invasions from hackers if your device or the Wi-Fi network you’re on is not secure.
Because password management can be such a daunting process, you might want to consider using a password management tool to help you manage and periodically update your passwords.
Some CPAs consider themselves clever for coming up with easy-to-remember passwords, but hackers are often wise to this tactic.
The potential for devastating damage posed by data breaches means that not-for-profits and other organizations shouldn’t pinch pennies in this area. These tips can help reduce the risks.